• Strongest encryption type for WLAN

    For WLAN, what is the strongest encryption type?

    gladystina10 pointsBadges:
  • Find antivirus running through Windows 7 command line

    Through my Windows 7 command line, can I get the name of the antivirus that's currently running? Tasklist shows everything that's running but I want to see the name. Thank you.

    ITKE1,021,360 pointsBadges:
  • Decrypt Ubuntu file in Windows 10

    Not sure if this is the right place to ask this question but I thought I would try. I have both Ubuntu and Windows 10. I also have a file that's encrypted in Ubuntu. I have the public key too. Can I decrypt this file in Windows 10?

    ITKE1,021,360 pointsBadges:
  • Encrypt dual booting laptop

    Hi experts, I have an encryption question for you. My laptop is dual booting more than one OS. How can I encrypt it? I can't use BitLocker since that only works on Windows. Is this not possible? Do I have to encrypt Windows and Linux separately?

    ITKE1,021,360 pointsBadges:
  • Audit program for call center

    Is there an audit program specific to revenue assurance for a call center?

    bamba125765 pointsBadges:
  • Remove antivirus from Windows 10 computer

    I have a Windows 10 computer and recently installed a new antivirus. It's AVG. But now this is stopped me from playing my computer games. Now, I want to delete it. I went into the Control Panel and deleted it but it's still there (and I can access it). How can I remove it completely?

    ITKE1,021,360 pointsBadges:
  • How to remove Avast from Windows 10 desktop

    I just bought a new anti-virus so I want to uninstall Avast from my desktop. It was successful but the popup is still appearing in the bottom right of the screen. I have searched everywhere and it's not appearing anywhere else except there. Can I get rid of this altogether?

    ITKE1,021,360 pointsBadges:
  • PCI DSS Scoping – Create new LLC

    I had a customer ask me if they can setup an LLC to reduce PCI scope for a specific product. I told them that the issue is shared resources (people, processes, and technology) and that the work to setup and isolate network, people roles, process for this would be significant. My answer is really...

    JPSECGUY0015 pointsBadges:
  • Find ISO files creation date

    Hi, would anyone know if ISO files include their creation date? I need to know when it was created. How can I do that?

    ITKE1,021,360 pointsBadges:
  • Google Chrome is reporting website as not secure

    This is more of a general question but I need information ASAP. I usually work in Google Chrome and it's reporting a website that I usually go on as 'not secure'. In Chrome, can I find a more detailed explanation? Basically, I want to know why it's being reported as not secure. Appreciate the help.

    ITKE1,021,360 pointsBadges:
  • How to decrypt a SHA1 hash value?

    SHA= 2fd4e1c6 7a2d28fc ed849ee1 bb76e739 1b93eb12. How can I decrypt (to ASCII) the string using RPG/400? What is its coding scheme?

    rajat0175 pointsBadges:
  • CVE-2015-6834 Usage

    How can I use CVE-2015-6834 exploit? It's not a ready script and not listed in metasploit so I don't know how to use it. GHDB description makes no sense to me. Can anyone explain usage of this exploit? A demo would be helpful.

    slkdmr15 pointsBadges:
  • How to know if someone can see my web history

    This is more of a general IT/technology question. I'm on a password protected Wi-Fi network and I just did a scan for viruses (nothing came up). I'm still worried someone can see my web history. Is that possible? If so, what else can I do to make it more secure?

    ITKE1,021,360 pointsBadges:
  • Has someone hacked my Whatsapp account?

    Once I finished or end my whatsaap video call, I received a notification (you are using whatsaap video call). I didn't read until end. I was shocked. Because this is first time I received this kind notification. Is a third person hacking my whatsaap account or phone?

    Jeans8035 pointsBadges:
  • Can we dumb down what net neutrality means?

    We all hear a lot about it but most definitions are over the common users head. Some think it may be good in helping them get what they want without having to pay for. In some cases that won't help the guy paying $50mo for 25meg service where the next town over, with another carrier his friend...

    ToddN200079,325 pointsBadges:
  • What antivirus should I buy?

    If I want to buy an antivirus, what should I do? Meaning which one should I buy?

    helenhelen5 pointsBadges:
  • Has my PC been affected by the WannaCry virus?

    My main PC at my home still runs Windows 7. For some reason, I can't get to Windows Update from IE. I'm worried that I've been hacked or been affected by the WannaCry virus. Should I be worried? I ran a scan but didn't see anything (I think I'm just being paranoid). Can anyone reassure me?

    ITKE1,021,360 pointsBadges:
  • Testing patches for vulnerabilties

    Before installing a patch on any environment, a patch should be tested amongst other things for application testing and other conflicts. Should a patch not be tested for vulnerabilities to assess whether it is worth  the risk of applying the patch? I know patches tend to close a bigger whole that...

    Andanim5 pointsBadges:
  • How to do a full network system audit check

    We require a full network system audit check at workplace - our IT department personnel had a conflict of interest so to confirm data is secure and private we require a comprehensive check for any backdoors; passwords need to be changed; back ups required. Work at a personal injury law firm...

    anonymous10005 pointsBadges:
  • What type of medical data requires encryption?

    I want to know an example of medical data collected through sensors which require encryption.

    revaneshm01515 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following